301 patents
Page 12 of 16
Utility
Method and apparatus for entity-based resource protection for a cloud-based system
27 Jul 21
Systems and methods for limiting calls to access a cloud-based system are disclosed.
Subramanian Srinivasan, Arvind Nadendla
Filed: 29 May 20
Utility
Packet dump utility in a mobile application for efficient troubleshooting
20 Jul 21
Systems and methods include providing functionality for a user device while operating in background on the user device; responsive to a user request, starting collection of packets intercepted by the enterprise application; storing the collected packets on the user device; receiving a selection from the user of an issue type of a plurality of issue types for an issue; and providing the issue type and the collected packets for debugging of the issue type.
Rishabh Gupta, Rohit Goyal
Filed: 13 Aug 20
Utility
Distributed network application security policy enforcement
20 Jul 21
A system validates the establishment and/or continuation of a connection between two applications over a network using a two-stage process: (1) a local security agent executing on the same source system as the source application validates the connection against a set of policies stored locally on the source system; and (2) a local security agent executing on the same destination system as the destination application validates the connection against a set of policies stored locally on the destination system.
Peter Smith, Thomas Evan Keiser, Jr.
Filed: 20 Sep 19
Utility
Cloud application design for efficient troubleshooting
20 Jul 21
An enterprise application executed on a user device is configured to perform steps of providing functionality for a user device while operating in background on the user device; determining an issue with the functionality of the enterprise application; presenting a user of the user device a list of a plurality of issue types for selection thereof; receiving a selection from the user of an issue type for the issue; and collecting data from the user device based on the selected issue type.
Rohit Goyal, Rishabh Gupta
Filed: 21 Oct 19
Utility
Monitoring and analysis of third-party cloud-based applications
15 Jul 21
Systems and methods include, on a respective node of a plurality of nodes communicatively coupled to one another forming a cloud-based system, receiving a request to obtain data from the third-party cloud application.
Steve Peschka
Filed: 3 Mar 21
Utility
Dynamic rules engine in a cloud-based sandbox
24 Jun 21
Computer-implemented systems and methods include receiving unknown content in a cloud-based sandbox; performing an analysis of the unknown content in the cloud-based sandbox, to obtain a score to determine whether or not the unknown content is malware; obtaining events based on the analysis; running one or more rules on the events; and adjusting the score based on a result of the one or more.
Nirmal Singh Bhary, Deepen Desai
Filed: 30 Jan 20
Utility
Disaster recovery for a cloud-based security service
3 Jun 21
Systems and methods include intercepting traffic on the user device; forwarding the traffic to a cloud-based system for security processing therein; and, responsive to unavailability of the cloud-based system preventing the forwarding, performing local security processing of the traffic at the user device including determining whether the traffic is allowed based on a cache at the user device, forwarding the traffic separate from the cloud-based system when it is allowed, and blocking the traffic when it is not allowed.
Patrick Foxhoven, Amit Sinha, Vikas Mahajan, Rohit Goyal
Filed: 21 Jan 21
Utility
Distributed cloud-based dynamic name server surrogation systems and methods
1 Jun 21
A Dynamic Name Server (DNS) surrogation method, a DNS system, and a DNS server provide DNS surrogation which is the idea that if a user device sends a DNS resolution request to a given DNS server that server does not need to actually perform the recursion itself.
Patrick Foxhoven, John Chanak, William Fehring
Filed: 14 Dec 17
Utility
Proxy Auto Config (PAC) file parser systems and methods
27 May 21
Proxy Auto Config (PAC) file parser systems and methods enable file parsing on user devices without Just-in-Time (JIT) compilation in JavaScript, with a memory efficient implementation and with efficient performance.
Amandeep Singh
Filed: 21 Nov 19
Utility
Secure access for B2B applications
6 May 21
Systems and methods include, responsive to a request from a user for one or more Business-to-Business (B2B) applications, redirecting the request, by a cloud-based system, to an identity provider to authorize the user; displaying the one or more B2B applications that the user is authorized to access; responsive to a selection of a B2B application of the one or more B2B applications, creating a first tunnel from the B2B application to the cloud-based system; and stitching the first tunnel between the B2B application and the cloud-based system with a second tunnel between the user and the cloud-based system.
Patrick Foxhoven, John A. Chanak, William Fehring, Manoj Apte, Kunal Shah, Dhawal Sharma
Filed: 30 Oct 20
Utility
DLP appliance and method for protecting data sources used in data matching
22 Apr 21
Systems and methods of Exact Data Matching (EDM) for identifying related tokens in data content using structured signature data implemented in a cloud-based system receiving data sets and customer configuration from a customer, wherein the data sets include customer specific sensitive data from a structured data source with each token represented by a hash value and the customer configuration includes one or more primary keys for a plurality of records in the data sets; distributing the data sets and the customer configuration to a plurality of nodes in the cloud-based system; performing monitoring of content between a client of the customer and an external network; detecting a presence of a plurality of tokens associated with a record in the customer specific sensitive data based on the monitoring; and performing a policy-based action in the cloud-based system based on the detecting.
Balakrishna Bayar, Arun Bhallamudi, Srikanth Devarajan, Siva Udupa
Filed: 23 Dec 20
Utility
Adaptive multipath tunneling in cloud-based systems
8 Apr 21
Systems and methods implemented by a mobile device include establishing a plurality of tunnels to a gateway, wherein each of the plurality of tunnels is on one of a plurality of link layer channels at the mobile device; intercepting network traffic on the mobile device; forwarding the network traffic to one of the plurality of tunnels based on a set of traffic forwarding rules; and responsive to a network change for the mobile device, managing the plurality of tunnels and continuing the forwarding based on the managing.
Abhinav Bansal, Rohit Goyal
Filed: 23 Nov 20
Utility
Web crawler systems and methods to efficiently detect malicious sites
8 Apr 21
Systems and methods include receiving a list of web sites; anonymously browsing to each web site in the list; receiving a response based on the browsing; and analyzing the response to classify each web site as malicious or not based on a plurality of techniques including JavaScript (JS) obfuscation detection based on de-obfuscation.
Deepen Desai, Dhruval Gandhi, Sachin Matte
Filed: 18 Nov 19
Utility
Monitoring and analysis of cloud-based applications
6 Apr 21
Systems and methods include periodically sending a probe to a cloud application where the probe simulates user activity in the cloud application; receiving a response to the probe and determining one or more statistics of the cloud application based on the response; incorporating the one or more statistics in historical statistics; and causing a notification when any of the one or more statistics exceeds a defined threshold.
Steve Peschka
Filed: 10 Jan 20
Utility
Content delivery network protection from malware and data leakage
6 Apr 21
A Content Delivery Network (CDN) includes one or more cache servers communicatively coupled to end users for providing content thereto; and one or more origin servers communicatively coupled to the one or more cache servers through a plurality of nodes, the one or more cache servers are configured to receive traffic related to the content from the one or more origin servers through the one or more nodes of the plurality of nodes, based on one or more of a push technique and a pull technique, and the plurality of nodes are configured to monitor the traffic between the one or more origin servers and the one or more cache servers in an inline manner, process the traffic for malware and data leakage based on policy, and block the traffic responsive to detection of one or more of the malware and the data leakage, prior to traffic entering the CDN.
Dhawal Kumar Sharma, Manoj Apte, Patrick Foxhoven
Filed: 28 Jan 19
Utility
Packet dump utility in a mobile application for efficient troubleshooting
11 Mar 21
Systems and methods include providing functionality for a user device while operating in background on the user device; responsive to a user request, starting collection of packets intercepted by the enterprise application; storing the collected packets on the user device; receiving a selection from the user of an issue type of a plurality of issue types for an issue; and providing the issue type and the collected packets for debugging of the issue type.
Rishabh Gupta, Rohit Goyal
Filed: 13 Aug 20
Utility
Cloud application design for efficient troubleshooting
11 Mar 21
An enterprise application executed on a user device is configured to perform steps of providing functionality for a user device while operating in background on the user device; determining an issue with the functionality of the enterprise application; presenting a user of the user device a list of a plurality of issue types for selection thereof; receiving a selection from the user of an issue type for the issue; and collecting data from the user device based on the selected issue type.
Rohit Goyal, Rishabh Gupta
Filed: 21 Oct 19
Utility
Systems and methods for analyzing digital user experience
2 Mar 21
Systems and methods for analyzing digital user experience include performing inline monitoring of network access between one or more users each with an associated user device executing an agent application, the Internet, and one or more cloud applications and private applications accessible via lightweight connectors; based on user experience metrics collected by the inline monitoring and stored in a logging analysis system, obtaining user experience metrics for one or more users for a given time epoch and for a given application; determining a user experience score for the one or more users for the given time epoch and for the given application based on the obtained user experience metrics; and providing a graphical user interface displaying data related to various user experience scores for various users over various time epochs with various applications.
Dhawal Sharma, KD Mazboudi, Srikanth Devarajan, Chakkaravarthy Periyasamy Balaiah, Sreedhar Pampati, Amit Sinha
Filed: 25 Feb 19
Utility
Pattern similarity measures to quantify uncertainty in malware classification
18 Feb 21
Systems and methods include receiving content for classification; classifying the content as one of benign and malicious utilizing a model that has been trained with a training set of data including benign data and malicious data; determining a first pattern associated with the content; comparing the first pattern with a second pattern that is associated with one of the benign data and the malicious data; and determining an uncertainty of the classifying based on a distance between the first pattern and the second pattern.
Changsha Ma, Dianhuan Lin, Rex Shang, Kevin Guo, Howie Xu
Filed: 16 Aug 19
Utility
Identification of related tokens in a byte stream using structured signature data
2 Feb 21
Systems and methods of Exact Data Matching (EDM) for identifying related tokens in data content using structured signature data implemented in a cloud-based system receiving data sets and customer configuration from a customer, wherein the data sets include customer specific sensitive data from a structured data source with each token represented by a hash value and the customer configuration includes one or more primary keys for a plurality of records in the data sets; distributing the data sets and the customer configuration to a plurality of nodes in the cloud-based system; performing monitoring of content between a client of the customer and an external network; detecting a presence of a plurality of tokens associated with a record in the customer specific sensitive data based on the monitoring; and performing a policy-based action in the cloud-based system based on the detecting.
Balakrishna Bayar, Arun Bhallamudi, Srikanth Devarajan, Siva Udupa
Filed: 23 Oct 17